mirror of
				https://git.haproxy.org/git/haproxy.git/
				synced 2025-10-31 16:41:01 +01:00 
			
		
		
		
	
		
			
				
	
	
		
			64 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			64 lines
		
	
	
		
			2.9 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * include/proto/ssl_ckch.h
 | |
|  * ckch function prototypes
 | |
|  *
 | |
|  * Copyright (C) 2020 HAProxy Technologies, William Lallemand <wlallemand@haproxy.com>
 | |
|  *
 | |
|  * This library is free software; you can redistribute it and/or
 | |
|  * modify it under the terms of the GNU Lesser General Public
 | |
|  * License as published by the Free Software Foundation, version 2.1
 | |
|  * exclusively.
 | |
|  *
 | |
|  * This library is distributed in the hope that it will be useful,
 | |
|  * but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
|  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 | |
|  * Lesser General Public License for more details.
 | |
|  *
 | |
|  * You should have received a copy of the GNU Lesser General Public
 | |
|  * License along with this library; if not, write to the Free Software
 | |
|  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301  USA
 | |
|  */
 | |
| 
 | |
| #ifndef _PROTO_SSL_CKCH_H
 | |
| #define _PROTO_SSL_CKCH_H
 | |
| #ifdef USE_OPENSSL
 | |
| 
 | |
| /* cert_key_and_chain functions */
 | |
| 
 | |
| int ssl_sock_load_files_into_ckch(const char *path, struct cert_key_and_chain *ckch, char **err);
 | |
| int ssl_sock_load_pem_into_ckch(const char *path, char *buf, struct cert_key_and_chain *ckch , char **err);
 | |
| void ssl_sock_free_cert_key_and_chain_contents(struct cert_key_and_chain *ckch);
 | |
| 
 | |
| int ssl_sock_load_key_into_ckch(const char *path, char *buf, struct cert_key_and_chain *ckch , char **err);
 | |
| int ssl_sock_load_ocsp_response_from_file(const char *ocsp_path, char *buf, struct cert_key_and_chain *ckch, char **err);
 | |
| int ssl_sock_load_sctl_from_file(const char *sctl_path, char *buf, struct cert_key_and_chain *ckch, char **err);
 | |
| int ssl_sock_load_issuer_file_into_ckch(const char *path, char *buf, struct cert_key_and_chain *ckch, char **err);
 | |
| 
 | |
| /* checks if a key and cert exists in the ckch */
 | |
| #if HA_OPENSSL_VERSION_NUMBER >= 0x1000200fL
 | |
| static inline int ssl_sock_is_ckch_valid(struct cert_key_and_chain *ckch)
 | |
| {
 | |
| 	return (ckch->cert != NULL && ckch->key != NULL);
 | |
| }
 | |
| #endif
 | |
| 
 | |
| /* ckch_store functions */
 | |
| struct ckch_store *ckchs_load_cert_file(char *path, int multi, char **err);
 | |
| struct ckch_store *ckchs_lookup(char *path);
 | |
| struct ckch_store *ckchs_dup(const struct ckch_store *src);
 | |
| struct ckch_store *ckch_store_new(const char *filename, int nmemb);
 | |
| void ckch_store_free(struct ckch_store *store);
 | |
| 
 | |
| 
 | |
| /* ckch_inst functions */
 | |
| void ckch_inst_free(struct ckch_inst *inst);
 | |
| struct ckch_inst *ckch_inst_new();
 | |
| int ckch_inst_new_load_multi_store(const char *path, struct ckch_store *ckchs,
 | |
|                                    struct bind_conf *bind_conf, struct ssl_bind_conf *ssl_conf,
 | |
|                                    char **sni_filter, int fcount, struct ckch_inst **ckchi, char **err);
 | |
| int ckch_inst_new_load_store(const char *path, struct ckch_store *ckchs, struct bind_conf *bind_conf,
 | |
|                              struct ssl_bind_conf *ssl_conf, char **sni_filter, int fcount, struct ckch_inst **ckchi, char **err);
 | |
| 
 | |
| #endif /* USE_OPENSSL */
 | |
| #endif /* _PROTO_SSL_CRTLIST_H */
 |